Data Privacy Requires a Security Response

GDPR affords EU residents more control over personal information

Recent hacks into databases of some of the world’s biggest corporations and government organizations put the personal information of billions of people at risk. Data intended to remain private is showing up for sale on the internet, privacy has become a worldwide concern, and citizens are losing faith in the way their data is collected, stored and protected.

The European Union took a big step last year to ease its citizen’s concerns with the enaction of the General Data Protection Regulation (GDPR). EU residents now have much more control over their personal information. The GDPR requires they know what data is being collected, how it is being used and how they can opt in, not out, of a company’s database.

What constitutes personal data? That’s broadly defined to include just about anything that could be used to identify a person, including name, home and email addresses, birthdate, driver license number, gender, race, political affiliations and much more.

Although the GDPR specifically applies to nations within the EU, it has worldwide implications. Any organization, no matter where it’s based, that collects data gathered from an EU citizen must comply with the regulation. Failure to do so can result in penalties of up to €20 million or 4 percent of a company’s annual global revenue.

The European privacy movement has sparked a worldwide response. In the U.S., more than 10 states have enacted tougher regulations to protect its citizens’ personal data. Perhaps the most GDPR-like will take effect on January 1 in California. Online sites will be required to conspicuously post a “Do Not Sell My Personal Information” link. Parental consent will be required before selling data about a child under the age of 13.

The security industry was not a prime target of the GDPR, but it will feel an impact in the way organizations collect and use video surveillance and access control data. In the EU, video is considered to be personal data belonging to those captured in live or recorded images. By its nature, access control requires personal information from employees and vendors in return for a pass to enter facilities.

Organizations must have clearly defined goals for its security functions. That means being ready to explain camera placements, what images they expect to capture, and how the video will be used, stored and shared. How video will be shared may be the most critical component.

Strict cybersecurity controls are required to ensure securityrelated data can be viewed only by authorized personnel that may include corporate staff, law enforcement or even a hosted or managed service provider or central monitoring station.

It is obvious passwords protecting data can be hacked. They can also be shared.

Adding a card reader or keypad to a workstation provides a second layer of security. Yet there’s no guarantee the person using the card or entering a Personal Identification Number (PIN) has been authorized to do so.

This is where biometrics can play an important role in securing databases. Passwords, cards and PINs can be hacked, shared or stolen; a biometric identifier cannot. Biometrics offer a way for our industry to meet security goals for the protection of data while also restoring public confidence.

Biometrics involve the measurement of physical characteristics, something only the owner can possess. The most commonly used biometrics include iris patterns, fingerprints and facial recognition. Combining biometric and access readers or a keypad at the PC creates true two-factor authentication. Passwords can be eliminated while the database remains accessible only to authorized users.

The use of biometric technologies is now commonplace worldwide. You see them embedded in smartphones, at border crossings and in use for time and attendance, national ID cards, voter registration and more. Biometric readers can also authenticate consumers registering for websites or making purchases on the internet.

Among the major biometric technologies, iris recognition is widely considered the most accurate. No two people, even identical twins, have the same iris patterns. The technology works with people wearing glasses, contact lenses and safety goggles. It’s not affected by grease, dirt or scars as are fingerprint readers. Iris technology works with very large databases where facial recognition has been shown to be less effective.

GDPR and its goals have arrived with the simple concept that citizens have a right to know the information being collected about them, how it is used and be provided with an easy way to delete their data at any time.

The security industry should see GDPR and efforts at the state level in the U.S. as driving positive changes and eliminating inefficient data protection efforts. At the same time, we need to employ tools readily available to restore citizens’ sense of privacy whether they are completing an online transaction or engaging with a security system. A failure to act now may result in a more severe backlash that could negatively impact how we protect people and their personal data.

This article originally appeared in the October 2019 issue of Security Today.

Featured

  • Data Driven, Proactive Response

    As cities face rising demands for smarter policing and faster emergency response, Real Time Crime Centers (RTCCs) are emerging as essential hubs for data-driven public safety. In this interview, two experts with deep field experience — Ross Bourgeois of New Orleans and Dean Cunningham of Axis Communications — draw on decades of operational, leadership and technology expertise to share how RTCCs are transforming public safety through innovation, interagency collaboration and a relentless focus on community impact. Read Now

  • Integration Imagination: The Future of Connected Operations

    Security teams that collaborate cross-functionally and apply imagination and creativity to envision and design their ideal integrated ecosystem will have the biggest upside to corporate security and operational benefits. Read Now

  • Smarter Access Starts with Flexibility

    Today’s workplaces are undergoing a rapid evolution, driven by hybrid work models, emerging smart technologies, and flexible work schedules. To keep pace with growing workplace demands, buildings are becoming more dynamic – capable of adapting to how people move, work, and interact in real-time. Read Now

  • Trends Keeping an Eye on Business Decisions

    Today, AI continues to transform the way data is used to make important business decisions. AI and the cloud together are redefining how video surveillance systems are being used to simulate human intelligence by combining data analysis, prediction, and process automation with minimal human intervention. Many organizations are upgrading their surveillance systems to reap the benefits of technologies like AI and cloud applications. Read Now

  • The Future is Happening Outside the Cloud

    For years, the cloud has captivated the physical security industry. And for good reason. Remote access, elastic scalability and simplified maintenance reshaped how we think about deploying and managing systems. But as the number of cameras grows and resolutions push from HD to 4K and beyond, the cloud’s limits are becoming unavoidable. Bandwidth bottlenecks. Latency lags. Rising storage costs. These are not abstract concerns. Read Now

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.